Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Compromises Have Moved Beyond the Endpoint - You Need to Too! Nick Cavalancia - Techvangelism, Stacy Leidwinger - Secureworks, Kevin Johnson - Secure Ideas, Peter Jones - CISO The last few years have seen 10 years of digital transformation compress into 3 years and as a result, the entire architecture behind IT has changed b... 2 weeks ago | 49 mins Putting Zero Trust into Action to Secure the Hybrid Workforce Mike Crouse, Director, Enterprise User & Data Protection, Forcepoint | Heath Mullins, Senior Analyst, Forrester A fireside chat with guest speaker, Forrester Senior Analyst Heath Mullins As we transition from a remote to a fully mobile, hybrid workforce, organi... February 15, 2023 9:00am Defending Against Ransomware With CrowdStrike And ServiceNow Jason Rivera, CrowdStrike; Alex Cox, ServiceNow; Jonathon Brown, TechTarget Ransomware is one of the most serious cybersecurity threats facing organizations today. The past few years have seen a rise in such attacks and in the... 2 months ago | 47 mins 5 Ways to Establish Zero Trust in the Cloud with Orca Security and AWS Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm Making 5G Ready to Live on The Edge Kaitki Agarwal, Founder, President and CTO, A5G Networks, Inc. Edge IT is diverse, distributed, and largely siloed. With OT in the network that involves sensors, IoT devices etc., we need coordination with mobile ... 6 months ago | 19 mins 5 Steps to Simplifying Zero Trust with SASE Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Join Corey Kiesewetter as he discusses the benefits of a single-vendor SASE solution and how the CASB, ZTNA, SWG, DLP and Secure SD-WAN components can... 3 weeks ago | 23 mins Live now Ransomware: Un Pronostico Nublado Daniel Villasenor El Ransomware sigue ocupando un lugar destacado en los riesgos de ciberseguridad de la mayoría de empresas, sin embargo esta amenaza se ha transformad... February 2, 2023 3:00pm | 48 mins Goodbye, Passwords. Hello, Passkeys! Rohan Ramesh, Product Marketing Management Director - Entrust Passwords are not only annoying from a user experience standpoint, due to the number of passwords we need to remember, but they are also one of the we... February 2, 2023 4:00pm How to Implement Zero Trust and API Security Judith Kahrer and Gary Archer, Product Marketing Engineers at Curity APIs and microservices are exposed to multiple threats, including unauthorized access and escalation of privilege. Using a Zero Trust approach with it... 3 hours ago | 48 mins Protect your Microsoft 365 data from ransomware Charlie Smith (Consulting Solutions Architect, Barracuda) A primary concern associated with ransomware is the potential for data loss. Microsoft 365 data is an attractive target for cybercriminals; and with t... 6 hours ago | 64 mins Load more